搜索结果: 1-15 共查到“军队指挥学 hyperelliptic”相关记录74条 . 查询时间(0.093 秒)
μKummer: efficient hyperelliptic signatures and key exchange on microcontrollers
Hyperelliptic curve cryptography Kummer surface AVR ATmega
2016/4/13
We describe the design and implementation of efficient signature and key-exchange schemes for the AVR~ATmega and ARM Cortex~M0 microcontrollers, targeting the 128-bit security level. Our algorithms ar...
Given a CM sextic field K, we give an explicit method for finding and constructing all genus 3 hyperelliptic curves whose Jacobians have complex multiplication by the maximal order of this field. Our ...
Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations
public-key cryptography hyperelliptic curves
2016/1/9
We present an efficient endomorphism for the Jacobian of a curve C of genus 2 for divisors having a Non
disjoint support. This extends the work of Costello in [12] who calculated explicit formul?for ...
A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves
Discrete Log Index calculus Hyperelliptic curve
2016/1/6
Decomposing a divisor over a suitable factor basis in the Jacobian of a hyperelliptic
curve is a crucial step in an index calculus algorithm for the discrete log problem in the
Jacobian. For small g...
A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves
hyperelliptic curves index calculus algorithm Nagao’s decomposition
2016/1/3
Nagao had proposed a decomposition method for divisors of hyperelliptic curves defined over a field \rFqn with n≥2. Joux and Vitse had later proposed a variant which provided relations among the facto...
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem
Hyperelliptic curves Bit Security Diffie-Hellman Problem
2015/12/29
The Diffie-Hellman problem as a cryptographic primitive plays an
important role in modern cryptology. The Bit Security or Hard-Core Bits of
Diffie-Hellman problem in arbitrary finite cyclic group is...
Motivated by the advantages of using elliptic curves for discrete logarithm-based public-key cryptography, there is an active research area investigating the potential of using hyperelliptic curves of...
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack under an Isogeny Condition
Weil descent attack GHS attack
2014/3/11
The GHS attack is known as a method to map the discrete logarithm problem(DLP) in the Jacobian of a curve C_{0} defined over the d degree extension k_{d} of a finite field k to the DLP in the Jacobian...
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions
public-key cryptography / Hyperelliptic Curves Genus 2 Order Computation
2012/6/14
The use of (hyper)elliptic curves in cryptography relies on the ability to compute the Jacobian order of a given curve. Recently, Satoh proposed a probabilistic polynomial time algorithm to test wheth...
A note on semi-bent functions with multiple trace terms and hyperelliptic curves
Boolean function Walsh-Hadamard transformation Semi-bent functions Dickson polynomial Hyperelliptic curves
2012/3/22
Semi-bent functions with even number of variables are a class of important Boolean functions whose Hadamard transform takes three values. In this note we are interested in the property of semi-bentnes...
A note on semi-bent functions with multiple trace terms and hyperelliptic curves
Boolean function Walsh-Hadamard transformation Semi-bent functions Dickson polynomial Hyperelliptic curves
2012/3/22
Semi-bent functions with even number of variables are a class of important Boolean functions whose Hadamard transform takes three values. In this note we are interested in the property of semi-bentnes...
A note on semi-bent functions with multiple trace terms and hyperelliptic curves
Boolean function Walsh-Hadamard transformation
2012/6/14
Semi-bent functions with even number of variables are a class of important Boolean functions whose Hadamard transform takes three values. In this note we are interested in the property of semi-bentnes...
A note on semi-bent functions with multiple trace terms and hyperelliptic curves
Boolean function Walsh-Hadamard transformation Semi-bent functions Dickson polynomial Hyperelliptic curves
2012/3/21
Semi-bent functions with even number of variables are a class of important Boolean functions whose Hadamard transform takes three values. In this note we are interested in the property of semi-bentnes...
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions
public-key cryptography / Hyperelliptic Curves Genus 2 Order Computation Ordinary Curves Pairing-Friendly Constructions Cocks-Pinch Method Brezing-Weng Method.
2012/3/22
The use of (hyper)elliptic curves in cryptography relies on the ability to compute the Jacobian order of a given curve. Recently, Satoh proposed a probabilistic polynomial time algorithm to test wheth...
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions
public-key cryptography / Hyperelliptic Curves Genus 2 Order Computation Ordinary Curves Pairing-Friendly Constructions Cocks-Pinch Method Brezing-Weng Method.
2012/3/21
The use of (hyper)elliptic curves in cryptography relies on the ability to compute the Jacobian order of a given curve. Recently, Satoh proposed a probabilistic polynomial time algorithm to test wheth...